Escaping an Abusive Household
๐ขmathematics
Flag this post
Obsidian for studying
๐ขmathematics
Flag this post
Keynote: Supply Chain Reaction: A Cautionary Tale in K8s Security - S. Potter & A.G. Veytia
youtube.comยท4h
๐open source
Flag this post
3D Imaging Buried Interfaces In Twisted Oxide Moirรฉs (Cornell, SLAC, Stanford et al.)
semiengineering.comยท21h
๐open source
Flag this post
From Paper to Pocket: How Wallet-Native CX is Rewriting the Insurance Playbook -
enterprisetimes.co.ukยท7h
๐open source
Flag this post
๐ฅ Tech Talks Weekly #82
techtalksweekly.ioยท14m
๐open source
Flag this post
TryHackMe: Defensive Security Intro
abefromen.bearblog.devยท2d
๐open source
Flag this post
AI's Impact on Social Psychology: Ethical Guardrails Matter
psychologytoday.comยท1d
๐ขmathematics
Flag this post
MT-HuBERT: Self-Supervised Mix-Training for Few-Shot Keyword Spotting in Mixed Speech
arxiv.orgยท1d
๐open source
Flag this post
Integrating FinTech Analytics and Cybersecurity for U.S. Consumer Protection and Financial Fraud Prevention
๐ขmathematics
Flag this post
The Builder's Notes: Your CFO Just Called โ Except It's a $2.4M Deepfake and Your AI Approved It
pub.towardsai.netยท2d
๐open source
Flag this post
The Future of AI-Powered Security
๐open source
Flag this post
Whisper it - Microsoft uncovers sneaky new attack targeting top LLMs to gain access to encrypted traffic
techradar.comยท21h
๐open source
Flag this post
Loading...Loading more...